The usability of knowledge based authentication methods on mobile devices

Doctoral thesis English OPEN
Rooney, James (2013)
  • Subject: QA75

Mobile devices are providing ever increasing functionality to users, and the risks associated with applications storing personal details are high. Graphical authentication methods have been shown to provide better security in terms of password space than traditional approaches, as well as being more memorable. The usability of any system is important since an unusable system will often be avoided. This thesis aims to investigate graphical authentication methods based on recall, cued recall and recognition memory in terms of their usability and security.
  • References (9)

    Brown, A.S., Bracken, E., Zoccoli, S. & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology. 18 (6): 641-651.

    Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G. & Pazzani, M. (2001).

    Improving Mobile Internet Usability. In: Proceedings of the 10th International Conference on the World Wide Web. WWW '01. Hong Kong, New York, NY, USA: ACM. pp. 673- 680.

    Budgen, D. (2008). ASE-EVAL: Software Evaluation Glossary - Version 1.1. Available from: [Accessed: 07/07/2010].

    Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C. & Tront, J.G. (2008). Mobile Device Profiling and Intrusion Detection Using Smart Batteries. In: 41st Annual Hawaii International Conference on System Sciences. Waikoloa, Big Island, Hawaii, January 7-10, IEEE Computer Society. pp. 296-296.

    Burr, W.E., Dodson, D.F. & Polk, W.T. (2006). Electronic Authentication Guideline.

    Available from:

    [Accessed: 08/01/2010].

    Hager, C.T. & Midkiff, S.F. (2003). An analysis of Bluetooth security vulnerabilities. In: IEEE Wireless Communications and Networking. New Orleans, LA, USA, 20th March 2003, pp. 1825-1831.

  • Metrics
    No metrics available
Share - Bookmark